default search action
Kuanjiu Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Yicong Li, Kuanjiu Zhou, Mingyu Fan, Shaozhao Zhai, Muhammad Usman Arshad:
Enhancing Concept Completeness for Graph Neural Networks via Side-Channel. ICHMS 2024: 1-4 - 2023
- [j13]Lin Xu, Li Li, Meiying Wang, Xiangxu Wang, Yicong Li, Weidong Li, Kuanjiu Zhou:
Online Prediction Method for Power System Frequency Response Analysis Based on Swarm Intelligence Fusion Model. IEEE Access 11: 13519-13532 (2023) - 2021
- [j12]Masahiko Watanabe, Kuanjiu Zhou, Yicong Li, Zizhong Wang, Junyu Li:
EHSTM: a formal model of embedded software and research on several key issues. CCF Trans. High Perform. Comput. 3(4): 365-382 (2021) - [c15]Yicong Li, Kuanjiu Zhou, Lin Xu, Meiying Wang, Nan Liu:
Ferproof: A Constant Cost Range Proof Suitable for Floating-Point Numbers. ICA3PP (3) 2021: 648-667 - 2020
- [j11]Yingjie Wang, Kuanjiu Zhou, Zumin Wang, Mingchu Li, Nan Chen, Bin Li, Hongxuan Tian:
Research on Real-Time Embedded Software Scheduling Model Based on EDF. IEEE Access 8: 20058-20066 (2020) - [j10]Yingjie Wang, Kuanjiu Zhou, Jie Pan, Mingchu Li:
Interrupt nesting method based on time slice in embedded software. Int. J. Inf. Commun. Technol. 17(2): 107-128 (2020)
2010 – 2019
- 2019
- [j9]Yingjie Wang, Kuanjiu Zhou, Mingchu Li:
实时嵌入式系统的WCET分析与预测研究综述 (Survey of WCET Analysis and Prediction for Real-time Embedded Systems). 计算机科学 46(6A): 16-22 (2019) - [c14]Jie Wang, Shuangmin Deng, Junjie Kang, Gang Hou, Kuanjiu Zhou, Chi Lin:
A Real-Time Fault Location Mechanism Combining CGP Code and Deep Learning. DSA 2019: 311-316 - [c13]Gang Hou, Weiqiang Kong, Kuanjiu Zhou, Jie Wang, Chi Lin:
Non-Deterministic Behavior Analysis for Embedded Software Based on Probabilistic Model Checking. ICPADS 2019: 844-851 - 2018
- [c12]Gang Hou, Weiqiang Kong, Kuanjiu Zhou, Jie Wang, Xun Cao, Akira Fukuda:
Analysis of Interrupt Behavior Based on Probabilistic Model Checking. IIAI-AAI 2018: 86-91 - 2017
- [j8]Gang Hou, Kuanjiu Zhou, Tie Qiu, Weiqiang Kong, Mingchu Li:
Performance Evaluation for Interrupt-Driven Embedded Software Based on EDSPN. IEEE Access 5: 5178-5189 (2017) - [j7]Kai Cui, Kuanjiu Zhou, Houbing Song, Mingchu Li:
Automated Software Testing Based on Hierarchical State Transition Matrix for Smart TV. IEEE Access 5: 6492-6501 (2017) - [j6]Kai Cui, Kuanjiu Zhou, Tie Qiu, Mingchu Li, Leiming Yan:
A hierarchical combinatorial testing method for smart phone software in wearable IoT systems. Comput. Electr. Eng. 61: 250-265 (2017) - [j5]Gang Hou, Kuanjiu Zhou, Tie Qiu, Xun Cao, Mingchu Li, Jie Wang:
A novel green software evaluation model for cloud robotics. Comput. Electr. Eng. 63: 139-156 (2017) - [j4]Kai Cui, Jie Wang, Houbing Song, Chi Lin, Kuanjiu Zhou, Mingchu Li:
Effective hybrid load scheduling of online and offline clusters for e-health service. Neurocomputing 220: 60-66 (2017) - [j3]Haoran Liang, Kuanjiu Zhou, Kai Cui, Jie Pan, Gang Hou:
基于PEFSM行为模型的黑盒测试用例生成方法 (Black-box Test Case Generation Method Based on PEFSM Behavioral Model). 计算机科学 44(4): 234-240 (2017) - 2016
- [c11]Gang Hou, Kuanjiu Zhou, Yanran Wu, Zongzheng Chi, Jie Wang, Mingchu Li:
ETSTM: A New Green Software Model. Trustcom/BigDataSE/ISPA 2016: 1825-1830 - 2015
- [c10]Gang Hou, Yinfeng Ban, Kuanjiu Zhou, Jie Wang, Mingchu Li, Zihao Liao:
Energy Consumption Analysis Method of CPS Software Based on Architecture Modeling. FCST 2015: 34-39 - 2014
- [j2]Jie Wang, Yanshuo Yu, Kuanjiu Zhou:
A Regular Expression Matching Approach to Distributed Wireless Network Security System. Int. J. Netw. Secur. 16(5): 382-388 (2014) - [c9]Shenglai Yang, Kuanjiu Zhou, Jie Wang, Bin Liu, Ting Li:
A Partition Method of SoC Design Serving the Multi-FPGA Verification Platform. ACA 2014: 43-57 - 2013
- [c8]Gang Hou, Kuanjiu Zhou, Junwang Chang, Rui Li, Mingchu Li:
Interrupt Modeling and Verification for Embedded Systems Based on Time Petri Nets. APPT 2013: 62-76 - [c7]Kuanjiu Zhou, Jiawei Yong, Xiaolong Wang, Longtao Ren, Gang Hou, Junwang Chang:
Accelerating Software Model Checking Based on Program Backbone. APPT 2013: 347-358 - [c6]Jie Wang, Kuanjiu Zhou, Kai Cui, Xiangjie Kong, Guang Yang:
Evaluation of the Task Communication Performance in Wireless Sensor Networks: A Queue Theory Approach. GreenCom/iThings/CPScom 2013: 939-944 - 2012
- [j1]Kuanjiu Zhou, Xiaolong Wang, Gang Hou, Jie Wang, Shanbin Ai:
Software Reliability Test Based on Markov Usage Model. J. Softw. 7(9): 2061-2068 (2012) - [c5]Xiaochen Lai, Kuanjiu Zhou, Likun Li, Lemin Tang, Yanshuang Yao, Liang Yu:
A Method of Software Defects Mining Based on Static Analysis. IEA/AIE 2012: 794-807 - 2011
- [c4]Chuang Lin, Xirui Sun, Kuanjiu Zhou, Feng Xia:
Supervised Gabor-Based Kernel Locality Preserving Projections for Face Recognition. iThings/CPSCom 2011: 252-257
2000 – 2009
- 2007
- [c3]Wubin Guo, Xiangpei Hu, Kuanjiu Zhou, Lijun Sun:
An Intelligent Query System Based on Chinese Short Message Service for Restaurant Recommendation. ICMB 2007: 60 - [c2]Shirong Zhang, Kuanjiu Zhou, Yuan Tian:
An Improved NN-SVM Based on K Congener Nearest Neighbors Classification Algorithm. KSEM 2007: 550-555 - [c1]Gang Hou, Kuanjiu Zhou, Yang Tian:
Algorithm for Public Transit Trip with Minimal Transfer Times and Shortest Travel Time. KSEM 2007: 562-567
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint